Логотип exploitDog
bind:CVE-2024-21643
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-21643

Количество 2

Количество 2

nvd логотип

CVE-2024-21643

около 2 лет назад

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by default for the `SignedHttpRequest`protocol. This raises the possibility to make any remote or local `HTTP GET` request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-rv9j-c866-gp5h

около 2 лет назад

Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-21643

IdentityModel Extensions for .NET provide assemblies for web developers that wish to use federated identity providers for establishing the caller's identity. Anyone leveraging the `SignedHttpRequest`protocol or the `SignedHttpRequestValidator`is vulnerable. Microsoft.IdentityModel trusts the `jku`claim by default for the `SignedHttpRequest`protocol. This raises the possibility to make any remote or local `HTTP GET` request. The vulnerability has been fixed in Microsoft.IdentityModel.Protocols.SignedHttpRequest. Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher.

CVSS3: 7.1
1%
Низкий
около 2 лет назад
github логотип
GHSA-rv9j-c866-gp5h

Microsoft.IdentityModel.Protocols.SignedHttpRequest remote code execution vulnerability

CVSS3: 7.1
1%
Низкий
около 2 лет назад

Уязвимостей на страницу